Skip to content

Commit 2f7b30c

Browse files
committed
Merge pull request #485 from mhaskel/merge_1.4.x_to_master
Merge 1.4.x to master
2 parents fc75895 + 76c1add commit 2f7b30c

3 files changed

Lines changed: 25 additions & 3 deletions

File tree

CHANGELOG.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,21 @@
1+
##2015-01-27 - Supported Release 1.4.0
2+
###Summary
3+
4+
This release includes physdev support, the ability to look up usernames from uuid, and a number of bugfixes
5+
6+
####Features
7+
- Add `netmap` feature
8+
- Add `physdev` support
9+
- Add ability to look up username from uuid (MODULES-753, MODULES-1688)
10+
11+
####Bugfixes
12+
- Sync iptables/ip6tables providers (MODULES-1612)
13+
- Fix package names for Amazon and Ubuntu 14.10 (MODULES-1029)
14+
- Fix overly aggressive gsub when `ensure => absent` (MODULES-1453)
15+
- Unable to parse `-m (tcp|udp)` rules (MODULES-1552)
16+
- Fix ip6tables provider when `iptables-ipv6` package isn't installed for EL6 (MODULES-633)
17+
- Test fixes
18+
119
##2014-12-16 - Supported Release 1.3.0
220
###Summary
321

README.markdown

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -339,12 +339,12 @@ This type enables you to manage firewall rules within Puppet.
339339

340340
* `ip6tables`: Ip6tables type provider
341341
* Required binaries: `ip6tables-save`, `ip6tables`.
342-
* Supported features: `connection_limiting`, `dnat`, `hop_limiting`, `icmp_match`, `interface_match`, `ipsec_dir`, `ipsec_policy`, `ipset`, `iptables`, `isfirstfrag`, `ishasmorefrags`, `islastfrag`, `log_level`, `log_prefix`, `mark`, `mask`, `owner`, `physdev_in`, `physdev_out`, `pkttype`, `rate_limiting`, `recent_limiting`, `reject_type`, `snat`, `socket`, `state_match`, `tcp_flags`.
342+
* Supported features: `address_type`, `connection_limiting`, `dnat`, `hop_limiting`, `icmp_match`, `interface_match`, `iprange`, `ipsec_dir`, `ipsec_policy`, `ipset`, `iptables`, `isfirstfrag`, `ishasmorefrags`, `islastfrag`, `log_level`, `log_prefix`, `mark`, `mask`, `owner`, `pkttype`, `rate_limiting`, `recent_limiting`, `reject_type`, `snat`, `socket`, `state_match`, `tcp_flags`.
343343

344344
* `iptables`: Iptables type provider
345345
* Required binaries: `iptables-save`, `iptables`.
346346
* Default for `kernel` == `linux`.
347-
* Supported features: `address_type`, `connection_limiting`, `dnat`, `icmp_match`, `interface_match`, `iprange`, `ipsec_dir`, `ipsec_policy`, `ipset`, `iptables`, `isfragment`, `log_level`, `log_prefix`, `mark`, `mask`, `owner`, `physdev_in`, `physdev_out`, `pkttype`, `rate_limiting`, `recent_limiting`, `reject_type`, `snat`, `socket`, `state_match`, `tcp_flags`, `netmap`.
347+
* Supported features: `address_type`, `connection_limiting`, `dnat`, `icmp_match`, `interface_match`, `iprange`, `ipsec_dir`, `ipsec_policy`, `ipset`, `iptables`, `isfragment`, `log_level`, `log_prefix`, `mark`, `mask`, `netmap`, `owner`, `pkttype`, `rate_limiting`, `recent_limiting`, `reject_type`, `snat`, `socket`, `state_match`, `tcp_flags`.
348348

349349
**Autorequires:**
350350

@@ -514,6 +514,10 @@ firewall { '999 this runs last':
514514

515515
* `outiface`: Output interface to filter on. Values must match '/^!?\s?[a-zA-Z0-9\-\._\+\:]+$/'. Requires the `interface_match` feature. Supports interface alias (eth0:0) and negation.
516516

517+
* `physdev_in`: Match if the packet is entering a bridge from the given interface. Values must match '/^[a-zA-Z0-9\-\._\+]+$/'.
518+
519+
* `physdev_out`: Match if the packet is leaving a bridge via the given interface. Values must match '/^[a-zA-Z0-9\-\._\+]+$/'.
520+
517521
* `pkttype`: Sets the packet type to match. Valid values are: 'unicast', 'broadcast', and'multicast'. Requires the `pkttype` feature.
518522

519523
* `port`: The destination or source port to match for this filter (if the protocol supports ports). Will accept a single element or an array. For some firewall providers you can pass a range of ports in the format: 'start number-end number'. For example, '1-1024' would cover ports 1 to 1024.

metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "puppetlabs-firewall",
3-
"version": "1.3.0",
3+
"version": "1.4.0",
44
"author": "Puppet Labs",
55
"summary": "Manages Firewalls such as iptable",
66
"license": "Apache-2.0",

0 commit comments

Comments
 (0)